summaryrefslogtreecommitdiffstats
path: root/source/d
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-04-27 21:43:51 +0000
committer Eric Hameleers <alien@slackware.com>2022-04-28 08:59:37 +0200
commit2ab30d1fd90998cdb2715bec99430671123c3ece (patch)
treea328234d670d7f3771dda79b370354b4344986f3 /source/d
parentee861a17268a54a17b3b321d9a1ff82ed547e606 (diff)
downloadcurrent-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.gz
current-2ab30d1fd90998cdb2715bec99430671123c3ece.tar.xz
Wed Apr 27 21:43:51 UTC 202220220427214351
a/kernel-generic-5.17.5-x86_64-1.txz: Upgraded. a/kernel-huge-5.17.5-x86_64-1.txz: Upgraded. a/kernel-modules-5.17.5-x86_64-1.txz: Upgraded. a/sysvinit-3.04-x86_64-1.txz: Upgraded. ap/sqlite-3.38.3-x86_64-1.txz: Upgraded. d/gcc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-brig-11.3.0-x86_64-1.txz: Upgraded. d/gcc-g++-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gdc-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gfortran-11.3.0-x86_64-1.txz: Upgraded. d/gcc-gnat-11.3.0-x86_64-1.txz: Upgraded. d/gcc-go-11.3.0-x86_64-1.txz: Upgraded. d/gcc-objc-11.3.0-x86_64-1.txz: Upgraded. d/kernel-headers-5.17.5-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-1.txz: Upgraded. This also updates the embedded GCC version number. k/kernel-source-5.17.5-noarch-1.txz: Upgraded. CC_VERSION_TEXT "gcc (GCC) 11.2.0" -> "gcc (GCC) 11.3.0" GCC_VERSION 110200 -> 110300 +CC_HAS_SLS y +SLS y kde/krita-5.0.6-x86_64-1.txz: Upgraded. l/netpbm-10.98.02-x86_64-1.txz: Upgraded. l/nodejs-16.15.0-x86_64-1.txz: Upgraded. n/curl-7.83.0-x86_64-1.txz: Upgraded. This update fixes security issues: OAUTH2 bearer bypass in connection re-use. Credential leak on redirect. Bad local IPv6 connection reuse. Auth/cookie leak on redirect. For more information, see: https://curl.se/docs/CVE-2022-22576.html https://curl.se/docs/CVE-2022-27774.html https://curl.se/docs/CVE-2022-27775.html https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 (* Security fix *) n/fetchmail-6.4.30-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'source/d')
-rwxr-xr-xsource/d/gcc/gcc.SlackBuild6
-rw-r--r--source/d/gcc/patches/7185690.diff27
-rwxr-xr-xsource/d/libtool/libtool.SlackBuild2
3 files changed, 2 insertions, 33 deletions
diff --git a/source/d/gcc/gcc.SlackBuild b/source/d/gcc/gcc.SlackBuild
index 6e5e6b321..a1a6c4c6c 100755
--- a/source/d/gcc/gcc.SlackBuild
+++ b/source/d/gcc/gcc.SlackBuild
@@ -57,7 +57,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=gcc
SRCVER=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
VERSION=$(echo $SRCVER | cut -f 1 -d _)
-BUILD=${BUILD:-2}
+BUILD=${BUILD:-1}
# How many jobs to run in parallel:
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
@@ -174,10 +174,6 @@ zcat $CWD/patches/gfortran.deferred-shape-vs-assumed-shape.patch.gz | patch -p0
# Fix regressions in 10.3.0 (and presumably 11.1.0 since they still apply cleanly):
zcat $CWD/patches/PR100102-2.a1b3484a8e6c53c8084723e3f1738d402374198e.patch.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
-# Fix compiler error in gcc-go
-# https://github.com/golang/go/issues/47771
-zcat $CWD/patches/7185690.diff.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
-
# Fix perms/owners:
chown -R root:root .
find . \
diff --git a/source/d/gcc/patches/7185690.diff b/source/d/gcc/patches/7185690.diff
deleted file mode 100644
index 4d0824fd3..000000000
--- a/source/d/gcc/patches/7185690.diff
+++ /dev/null
@@ -1,27 +0,0 @@
-From 71856902b87505ff8ab6845533b598bffe5333bb Mon Sep 17 00:00:00 2001
-From: Ian Lance Taylor <iant@golang.org>
-Date: Sat, 21 Aug 2021 12:42:19 -0700
-Subject: [PATCH] compiler: correct condition for calling memclrHasPointers
-
-When compiling append(s, make([]typ, ln)...), where typ has a pointer,
-and the append fits within the existing capacity of s, the condition
-used to clear out the new elements was reversed.
-
-Fixes golang/go#47771
-
-Change-Id: Ia880adc08ab723afe3f927e65c9e081f9f717f90
----
-
-diff --git a/gcc/go/gofrontend/expressions.cc b/gcc/go/gofrontend/expressions.cc
-index 8d4d168..ddb1d91 100644
---- a/gcc/go/gofrontend/expressions.cc
-+++ b/gcc/go/gofrontend/expressions.cc
-@@ -9350,7 +9350,7 @@
- ref2 = Expression::make_cast(uint_type, ref2, loc);
- cond = Expression::make_binary(OPERATOR_GT, ref, ref2, loc);
- zero = Expression::make_integer_ul(0, int_type, loc);
-- call = Expression::make_conditional(cond, call, zero, loc);
-+ call = Expression::make_conditional(cond, zero, call, loc);
- }
- }
- else
diff --git a/source/d/libtool/libtool.SlackBuild b/source/d/libtool/libtool.SlackBuild
index cd6fd7617..bf80013e8 100755
--- a/source/d/libtool/libtool.SlackBuild
+++ b/source/d/libtool/libtool.SlackBuild
@@ -24,7 +24,7 @@ cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=libtool
VERSION=${VERSION:-$(echo libtool-*.tar.xz | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
-BUILD=${BUILD:-18}
+BUILD=${BUILD:-1}
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}